Fill in the blank: Security analysts use ____ to create isolated subnets for different departments in an organization.
a. Network segmentation
b. Patch updating
c. Cloud hardening
d. Penetration testing